tangled
alpha
login
or
join now
encode42.dev
/
nixos
0
fork
atom
Personal-use NixOS configuration
0
fork
atom
overview
issues
pulls
pipelines
Begin work on Tangled Spindle
encode42.dev
1 month ago
3bef3d8f
3b86a8c9
+91
-34
6 changed files
expand all
collapse all
unified
split
hosts
index
config
atmosphere
tangled-knot.nix
tangled-spindle.nix
default.nix
packages
server
atmosphere
tangled-knot.nix
tangled-spindle.nix
tangled.nix
+29
hosts/index/config/atmosphere/tangled-spindle.nix
···
1
1
+
{ flakeRoot, ... }:
2
2
+
3
3
+
let
4
4
+
host = "spindle.encrypted.group";
5
5
+
6
6
+
tangledSpindleModule = import (flakeRoot + /packages/server/atmosphere/tangled-spindle.nix) {
7
7
+
hosts = [
8
8
+
{
9
9
+
name = host;
10
10
+
ssl = "cloudflare";
11
11
+
}
12
12
+
];
13
13
+
};
14
14
+
in
15
15
+
{
16
16
+
imports = [
17
17
+
tangledSpindleModule
18
18
+
];
19
19
+
20
20
+
services.tangled.spindle = {
21
21
+
server = {
22
22
+
hostname = host;
23
23
+
24
24
+
owner = "did:plc:2uoarm26m6b24zqbq7h2kpqs";
25
25
+
26
26
+
dbPath = "/mnt/apps/tangled/spindle.db";
27
27
+
};
28
28
+
};
29
29
+
}
+2
-2
hosts/index/config/atmosphere/tangled.nix
hosts/index/config/atmosphere/tangled-knot.nix
···
3
3
let
4
4
host = "knot.encrypted.group";
5
5
6
6
-
tangledModule = import (flakeRoot + /packages/server/atmosphere/tangled.nix) {
6
6
+
tangledKnotModule = import (flakeRoot + /packages/server/atmosphere/tangled-knot.nix) {
7
7
hosts = [
8
8
{
9
9
name = host;
···
14
14
in
15
15
{
16
16
imports = [
17
17
-
tangledModule
17
17
+
tangledKnotModule
18
18
];
19
19
20
20
services.tangled.knot = {
+2
-1
hosts/index/default.nix
···
27
27
./config/nfs.nix
28
28
29
29
./config/atmosphere/bluesky-pds.nix
30
30
-
./config/atmosphere/tangled.nix
30
30
+
./config/atmosphere/tangled-knot.nix
31
31
+
./config/atmosphere/tangled-spindle.nix
31
32
32
33
./config/databases/mysql.nix
33
34
./config/databases/postgresql.nix
+29
packages/server/atmosphere/tangled-knot.nix
···
1
1
+
{
2
2
+
hosts ? [ ],
3
3
+
}:
4
4
+
5
5
+
{
6
6
+
config,
7
7
+
flakeLib,
8
8
+
lib,
9
9
+
...
10
10
+
}:
11
11
+
12
12
+
let
13
13
+
port = 5555;
14
14
+
in
15
15
+
{
16
16
+
services.tangled.knot = {
17
17
+
enable = true;
18
18
+
19
19
+
server = {
20
20
+
listenAddr = "0.0.0.0:${toString port}";
21
21
+
};
22
22
+
23
23
+
openFirewall = false;
24
24
+
};
25
25
+
26
26
+
services.caddy.virtualHosts = flakeLib.mkProxies hosts ''
27
27
+
reverse_proxy :${toString port}
28
28
+
'';
29
29
+
}
+29
packages/server/atmosphere/tangled-spindle.nix
···
1
1
+
{
2
2
+
hosts ? [ ],
3
3
+
}:
4
4
+
5
5
+
{
6
6
+
config,
7
7
+
flakeLib,
8
8
+
lib,
9
9
+
...
10
10
+
}:
11
11
+
12
12
+
let
13
13
+
port = 6555;
14
14
+
in
15
15
+
{
16
16
+
services.tangled.spindle = {
17
17
+
enable = true;
18
18
+
19
19
+
server = {
20
20
+
listenAddr = "0.0.0.0:${toString port}";
21
21
+
22
22
+
maxJobCount = 3;
23
23
+
};
24
24
+
};
25
25
+
26
26
+
services.caddy.virtualHosts = flakeLib.mkProxies hosts ''
27
27
+
reverse_proxy :${toString port}
28
28
+
'';
29
29
+
}
-31
packages/server/atmosphere/tangled.nix
···
1
1
-
{
2
2
-
hosts ? [ ],
3
3
-
}:
4
4
-
5
5
-
{
6
6
-
config,
7
7
-
flakeLib,
8
8
-
lib,
9
9
-
...
10
10
-
}:
11
11
-
12
12
-
let
13
13
-
port = 5555;
14
14
-
in
15
15
-
{
16
16
-
services.tangled = {
17
17
-
knot = {
18
18
-
enable = true;
19
19
-
20
20
-
server = {
21
21
-
listenAddr = "0.0.0.0:${toString port}";
22
22
-
};
23
23
-
24
24
-
openFirewall = false;
25
25
-
};
26
26
-
};
27
27
-
28
28
-
services.caddy.virtualHosts = flakeLib.mkProxies hosts ''
29
29
-
reverse_proxy :${toString port}
30
30
-
'';
31
31
-
}